<h2>knqyf263/vuln-image (alpine 3.7.1) - Trivy Report - 2021-06-03T21:25:24.416449943Z</h2> <table> <tr class="group-header"><th colspan="6">alpine</th></tr> <tr class="sub-header"> <th>Package</th> <th>Vulnerability ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> <th>Links</th> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">curl</td> <td>CVE-2018-14618</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r0</td> <td class="links" data-more-links="off"> <a href="http://www.securitytracker.com/id/1041605">http://www.securitytracker.com/id/1041605</a> <a href="https://access.redhat.com/errata/RHSA-2018:3558">https://access.redhat.com/errata/RHSA-2018:3558</a> <a href="https://access.redhat.com/errata/RHSA-2019:1880">https://access.redhat.com/errata/RHSA-2019:1880</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf</a> <a href="https://curl.haxx.se/docs/CVE-2018-14618.html">https://curl.haxx.se/docs/CVE-2018-14618.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618</a> <a href="https://github.com/curl/curl/issues/2756">https://github.com/curl/curl/issues/2756</a> <a href="https://linux.oracle.com/cve/CVE-2018-14618.html">https://linux.oracle.com/cve/CVE-2018-14618.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-1880.html">https://linux.oracle.com/errata/ELSA-2019-1880.html</a> <a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://usn.ubuntu.com/3765-1/">https://usn.ubuntu.com/3765-1/</a> <a href="https://usn.ubuntu.com/3765-2/">https://usn.ubuntu.com/3765-2/</a> <a href="https://usn.ubuntu.com/usn/usn-3765-1">https://usn.ubuntu.com/usn/usn-3765-1</a> <a href="https://usn.ubuntu.com/usn/usn-3765-2">https://usn.ubuntu.com/usn/usn-3765-2</a> <a href="https://www.debian.org/security/2018/dsa-4286">https://www.debian.org/security/2018/dsa-4286</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">curl</td> <td>CVE-2018-16839</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r1</td> <td class="links" data-more-links="off"> <a href="http://www.securitytracker.com/id/1042012">http://www.securitytracker.com/id/1042012</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839</a> <a href="https://curl.haxx.se/docs/CVE-2018-16839.html">https://curl.haxx.se/docs/CVE-2018-16839.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839</a> <a href="https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5">https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html">https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://usn.ubuntu.com/3805-1/">https://usn.ubuntu.com/3805-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3805-1">https://usn.ubuntu.com/usn/usn-3805-1</a> <a href="https://www.debian.org/security/2018/dsa-4331">https://www.debian.org/security/2018/dsa-4331</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">curl</td> <td>CVE-2018-16840</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r1</td> <td class="links" data-more-links="off"> <a href="http://www.securitytracker.com/id/1042013">http://www.securitytracker.com/id/1042013</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840</a> <a href="https://curl.haxx.se/docs/CVE-2018-16840.html">https://curl.haxx.se/docs/CVE-2018-16840.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840</a> <a href="https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f">https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://usn.ubuntu.com/3805-1/">https://usn.ubuntu.com/3805-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3805-1">https://usn.ubuntu.com/usn/usn-3805-1</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">curl</td> <td>CVE-2018-16842</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r1</td> <td class="links" data-more-links="off"> <a href="http://www.securitytracker.com/id/1042014">http://www.securitytracker.com/id/1042014</a> <a href="https://access.redhat.com/errata/RHSA-2019:2181">https://access.redhat.com/errata/RHSA-2019:2181</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842</a> <a href="https://curl.haxx.se/docs/CVE-2018-16842.html">https://curl.haxx.se/docs/CVE-2018-16842.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842</a> <a href="https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211">https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211</a> <a href="https://linux.oracle.com/cve/CVE-2018-16842.html">https://linux.oracle.com/cve/CVE-2018-16842.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-2181.html">https://linux.oracle.com/errata/ELSA-2019-2181.html</a> <a href="https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html">https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://usn.ubuntu.com/3805-1/">https://usn.ubuntu.com/3805-1/</a> <a href="https://usn.ubuntu.com/3805-2/">https://usn.ubuntu.com/3805-2/</a> <a href="https://usn.ubuntu.com/usn/usn-3805-1">https://usn.ubuntu.com/usn/usn-3805-1</a> <a href="https://usn.ubuntu.com/usn/usn-3805-2">https://usn.ubuntu.com/usn/usn-3805-2</a> <a href="https://www.debian.org/security/2018/dsa-4331">https://www.debian.org/security/2018/dsa-4331</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">curl</td> <td>CVE-2019-3822</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r2</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/106950">http://www.securityfocus.com/bid/106950</a> <a href="https://access.redhat.com/errata/RHSA-2019:3701">https://access.redhat.com/errata/RHSA-2019:3701</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf</a> <a href="https://curl.haxx.se/docs/CVE-2019-3822.html">https://curl.haxx.se/docs/CVE-2019-3822.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822</a> <a href="https://linux.oracle.com/cve/CVE-2019-3822.html">https://linux.oracle.com/cve/CVE-2019-3822.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-3701.html">https://linux.oracle.com/errata/ELSA-2019-3701.html</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://security.netapp.com/advisory/ntap-20190315-0001/">https://security.netapp.com/advisory/ntap-20190315-0001/</a> <a href="https://security.netapp.com/advisory/ntap-20190719-0004/">https://security.netapp.com/advisory/ntap-20190719-0004/</a> <a href="https://support.f5.com/csp/article/K84141449">https://support.f5.com/csp/article/K84141449</a> <a href="https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp;utm_medium=RSS</a> <a href="https://usn.ubuntu.com/3882-1/">https://usn.ubuntu.com/3882-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3882-1">https://usn.ubuntu.com/usn/usn-3882-1</a> <a href="https://www.debian.org/security/2019/dsa-4386">https://www.debian.org/security/2019/dsa-4386</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">curl</td> <td>CVE-2019-5481</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r3</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html</a> <a href="https://curl.haxx.se/docs/CVE-2019-5481.html">https://curl.haxx.se/docs/CVE-2019-5481.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481</a> <a href="https://linux.oracle.com/cve/CVE-2019-5481.html">https://linux.oracle.com/cve/CVE-2019-5481.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-1792.html">https://linux.oracle.com/errata/ELSA-2020-1792.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/</a> <a href="https://seclists.org/bugtraq/2020/Feb/36">https://seclists.org/bugtraq/2020/Feb/36</a> <a href="https://security.gentoo.org/glsa/202003-29">https://security.gentoo.org/glsa/202003-29</a> <a href="https://security.netapp.com/advisory/ntap-20191004-0003/">https://security.netapp.com/advisory/ntap-20191004-0003/</a> <a href="https://usn.ubuntu.com/usn/usn-4129-1">https://usn.ubuntu.com/usn/usn-4129-1</a> <a href="https://www.debian.org/security/2020/dsa-4633">https://www.debian.org/security/2020/dsa-4633</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">curl</td> <td>CVE-2019-5482</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r3</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html</a> <a href="https://curl.haxx.se/docs/CVE-2019-5482.html">https://curl.haxx.se/docs/CVE-2019-5482.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482</a> <a href="https://linux.oracle.com/cve/CVE-2019-5482.html">https://linux.oracle.com/cve/CVE-2019-5482.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-5562.html">https://linux.oracle.com/errata/ELSA-2020-5562.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/</a> <a href="https://seclists.org/bugtraq/2020/Feb/36">https://seclists.org/bugtraq/2020/Feb/36</a> <a href="https://security.gentoo.org/glsa/202003-29">https://security.gentoo.org/glsa/202003-29</a> <a href="https://security.netapp.com/advisory/ntap-20191004-0003/">https://security.netapp.com/advisory/ntap-20191004-0003/</a> <a href="https://security.netapp.com/advisory/ntap-20200416-0003/">https://security.netapp.com/advisory/ntap-20200416-0003/</a> <a href="https://usn.ubuntu.com/usn/usn-4129-1">https://usn.ubuntu.com/usn/usn-4129-1</a> <a href="https://usn.ubuntu.com/usn/usn-4129-2">https://usn.ubuntu.com/usn/usn-4129-2</a> <a href="https://www.debian.org/security/2020/dsa-4633">https://www.debian.org/security/2020/dsa-4633</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">curl</td> <td>CVE-2018-16890</td> <td class="severity">HIGH</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r2</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/106947">http://www.securityfocus.com/bid/106947</a> <a href="https://access.redhat.com/errata/RHSA-2019:3701">https://access.redhat.com/errata/RHSA-2019:3701</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf</a> <a href="https://curl.haxx.se/docs/CVE-2018-16890.html">https://curl.haxx.se/docs/CVE-2018-16890.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890</a> <a href="https://linux.oracle.com/cve/CVE-2018-16890.html">https://linux.oracle.com/cve/CVE-2018-16890.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-3701.html">https://linux.oracle.com/errata/ELSA-2019-3701.html</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://security.netapp.com/advisory/ntap-20190315-0001/">https://security.netapp.com/advisory/ntap-20190315-0001/</a> <a href="https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp;utm_medium=RSS</a> <a href="https://usn.ubuntu.com/3882-1/">https://usn.ubuntu.com/3882-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3882-1">https://usn.ubuntu.com/usn/usn-3882-1</a> <a href="https://www.debian.org/security/2019/dsa-4386">https://www.debian.org/security/2019/dsa-4386</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">curl</td> <td>CVE-2019-3823</td> <td class="severity">HIGH</td> <td class="pkg-version">7.61.0-r0</td> <td>7.61.1-r2</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/106950">http://www.securityfocus.com/bid/106950</a> <a href="https://access.redhat.com/errata/RHSA-2019:3701">https://access.redhat.com/errata/RHSA-2019:3701</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf</a> <a href="https://curl.haxx.se/docs/CVE-2019-3823.html">https://curl.haxx.se/docs/CVE-2019-3823.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823</a> <a href="https://linux.oracle.com/cve/CVE-2019-3823.html">https://linux.oracle.com/cve/CVE-2019-3823.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-3701.html">https://linux.oracle.com/errata/ELSA-2019-3701.html</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://security.netapp.com/advisory/ntap-20190315-0001/">https://security.netapp.com/advisory/ntap-20190315-0001/</a> <a href="https://usn.ubuntu.com/3882-1/">https://usn.ubuntu.com/3882-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3882-1">https://usn.ubuntu.com/usn/usn-3882-1</a> <a href="https://www.debian.org/security/2019/dsa-4386">https://www.debian.org/security/2019/dsa-4386</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">expat</td> <td>CVE-2018-20843</td> <td class="severity">HIGH</td> <td class="pkg-version">2.2.5-r0</td> <td>2.2.7-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html</a> <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226</a> <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843</a> <a href="https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes">https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes</a> <a href="https://github.com/libexpat/libexpat/issues/186">https://github.com/libexpat/libexpat/issues/186</a> <a href="https://github.com/libexpat/libexpat/pull/262">https://github.com/libexpat/libexpat/pull/262</a> <a href="https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6">https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6</a> <a href="https://linux.oracle.com/cve/CVE-2018-20843.html">https://linux.oracle.com/cve/CVE-2018-20843.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-4484.html">https://linux.oracle.com/errata/ELSA-2020-4484.html</a> <a href="https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html">https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/</a> <a href="https://seclists.org/bugtraq/2019/Jun/39">https://seclists.org/bugtraq/2019/Jun/39</a> <a href="https://security.gentoo.org/glsa/201911-08">https://security.gentoo.org/glsa/201911-08</a> <a href="https://security.netapp.com/advisory/ntap-20190703-0001/">https://security.netapp.com/advisory/ntap-20190703-0001/</a> <a href="https://support.f5.com/csp/article/K51011533">https://support.f5.com/csp/article/K51011533</a> <a href="https://usn.ubuntu.com/4040-1/">https://usn.ubuntu.com/4040-1/</a> <a href="https://usn.ubuntu.com/4040-2/">https://usn.ubuntu.com/4040-2/</a> <a href="https://usn.ubuntu.com/usn/usn-4040-1">https://usn.ubuntu.com/usn/usn-4040-1</a> <a href="https://usn.ubuntu.com/usn/usn-4040-2">https://usn.ubuntu.com/usn/usn-4040-2</a> <a href="https://www.debian.org/security/2019/dsa-4472">https://www.debian.org/security/2019/dsa-4472</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">expat</td> <td>CVE-2019-15903</td> <td class="severity">HIGH</td> <td class="pkg-version">2.2.5-r0</td> <td>2.2.7-r1</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a> <a href="http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html">http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html</a> <a href="http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html">http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html</a> <a href="http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html">http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html</a> <a href="http://seclists.org/fulldisclosure/2019/Dec/23">http://seclists.org/fulldisclosure/2019/Dec/23</a> <a href="http://seclists.org/fulldisclosure/2019/Dec/26">http://seclists.org/fulldisclosure/2019/Dec/26</a> <a href="http://seclists.org/fulldisclosure/2019/Dec/27">http://seclists.org/fulldisclosure/2019/Dec/27</a> <a href="http://seclists.org/fulldisclosure/2019/Dec/30">http://seclists.org/fulldisclosure/2019/Dec/30</a> <a href="https://access.redhat.com/errata/RHSA-2019:3210">https://access.redhat.com/errata/RHSA-2019:3210</a> <a href="https://access.redhat.com/errata/RHSA-2019:3237">https://access.redhat.com/errata/RHSA-2019:3237</a> <a href="https://access.redhat.com/errata/RHSA-2019:3756">https://access.redhat.com/errata/RHSA-2019:3756</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903</a> <a href="https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43">https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43</a> <a href="https://github.com/libexpat/libexpat/issues/317">https://github.com/libexpat/libexpat/issues/317</a> <a href="https://github.com/libexpat/libexpat/issues/342">https://github.com/libexpat/libexpat/issues/342</a> <a href="https://github.com/libexpat/libexpat/pull/318">https://github.com/libexpat/libexpat/pull/318</a> <a href="https://linux.oracle.com/cve/CVE-2019-15903.html">https://linux.oracle.com/cve/CVE-2019-15903.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-4484.html">https://linux.oracle.com/errata/ELSA-2020-4484.html</a> <a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html</a> <a href="https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html">https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/</a> <a href="https://seclists.org/bugtraq/2019/Dec/17">https://seclists.org/bugtraq/2019/Dec/17</a> <a href="https://seclists.org/bugtraq/2019/Dec/21">https://seclists.org/bugtraq/2019/Dec/21</a> <a href="https://seclists.org/bugtraq/2019/Dec/23">https://seclists.org/bugtraq/2019/Dec/23</a> <a href="https://seclists.org/bugtraq/2019/Nov/1">https://seclists.org/bugtraq/2019/Nov/1</a> <a href="https://seclists.org/bugtraq/2019/Nov/24">https://seclists.org/bugtraq/2019/Nov/24</a> <a href="https://seclists.org/bugtraq/2019/Oct/29">https://seclists.org/bugtraq/2019/Oct/29</a> <a href="https://seclists.org/bugtraq/2019/Sep/30">https://seclists.org/bugtraq/2019/Sep/30</a> <a href="https://seclists.org/bugtraq/2019/Sep/37">https://seclists.org/bugtraq/2019/Sep/37</a> <a href="https://security.gentoo.org/glsa/201911-08">https://security.gentoo.org/glsa/201911-08</a> <a href="https://security.netapp.com/advisory/ntap-20190926-0004/">https://security.netapp.com/advisory/ntap-20190926-0004/</a> <a href="https://support.apple.com/kb/HT210785">https://support.apple.com/kb/HT210785</a> <a href="https://support.apple.com/kb/HT210788">https://support.apple.com/kb/HT210788</a> <a href="https://support.apple.com/kb/HT210789">https://support.apple.com/kb/HT210789</a> <a href="https://support.apple.com/kb/HT210790">https://support.apple.com/kb/HT210790</a> <a href="https://support.apple.com/kb/HT210793">https://support.apple.com/kb/HT210793</a> <a href="https://support.apple.com/kb/HT210794">https://support.apple.com/kb/HT210794</a> <a href="https://support.apple.com/kb/HT210795">https://support.apple.com/kb/HT210795</a> <a href="https://usn.ubuntu.com/4132-1/">https://usn.ubuntu.com/4132-1/</a> <a href="https://usn.ubuntu.com/4132-2/">https://usn.ubuntu.com/4132-2/</a> <a href="https://usn.ubuntu.com/4165-1/">https://usn.ubuntu.com/4165-1/</a> <a href="https://usn.ubuntu.com/4202-1/">https://usn.ubuntu.com/4202-1/</a> <a href="https://usn.ubuntu.com/4335-1/">https://usn.ubuntu.com/4335-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4132-1">https://usn.ubuntu.com/usn/usn-4132-1</a> <a href="https://usn.ubuntu.com/usn/usn-4132-2">https://usn.ubuntu.com/usn/usn-4132-2</a> <a href="https://usn.ubuntu.com/usn/usn-4165-1">https://usn.ubuntu.com/usn/usn-4165-1</a> <a href="https://usn.ubuntu.com/usn/usn-4202-1">https://usn.ubuntu.com/usn/usn-4202-1</a> <a href="https://usn.ubuntu.com/usn/usn-4335-1">https://usn.ubuntu.com/usn/usn-4335-1</a> <a href="https://www.debian.org/security/2019/dsa-4530">https://www.debian.org/security/2019/dsa-4530</a> <a href="https://www.debian.org/security/2019/dsa-4549">https://www.debian.org/security/2019/dsa-4549</a> <a href="https://www.debian.org/security/2019/dsa-4571">https://www.debian.org/security/2019/dsa-4571</a> <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903">https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">git</td> <td>CVE-2018-17456</td> <td class="severity">CRITICAL</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.3-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html">http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html</a> <a href="http://www.securityfocus.com/bid/105523">http://www.securityfocus.com/bid/105523</a> <a href="http://www.securityfocus.com/bid/107511">http://www.securityfocus.com/bid/107511</a> <a href="http://www.securitytracker.com/id/1041811">http://www.securitytracker.com/id/1041811</a> <a href="https://access.redhat.com/errata/RHSA-2018:3408">https://access.redhat.com/errata/RHSA-2018:3408</a> <a href="https://access.redhat.com/errata/RHSA-2018:3505">https://access.redhat.com/errata/RHSA-2018:3505</a> <a href="https://access.redhat.com/errata/RHSA-2018:3541">https://access.redhat.com/errata/RHSA-2018:3541</a> <a href="https://access.redhat.com/errata/RHSA-2020:0316">https://access.redhat.com/errata/RHSA-2020:0316</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456</a> <a href="https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404">https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404</a> <a href="https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46">https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46</a> <a href="https://linux.oracle.com/cve/CVE-2018-17456.html">https://linux.oracle.com/cve/CVE-2018-17456.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-0316.html">https://linux.oracle.com/errata/ELSA-2020-0316.html</a> <a href="https://marc.info/?l=git&m=153875888916397&w=2">https://marc.info/?l=git&m=153875888916397&w=2</a> <a href="https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com/</a> <a href="https://seclists.org/bugtraq/2019/Mar/30">https://seclists.org/bugtraq/2019/Mar/30</a> <a href="https://usn.ubuntu.com/3791-1/">https://usn.ubuntu.com/3791-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3791-1">https://usn.ubuntu.com/usn/usn-3791-1</a> <a href="https://www.debian.org/security/2018/dsa-4311">https://www.debian.org/security/2018/dsa-4311</a> <a href="https://www.exploit-db.com/exploits/45548/">https://www.exploit-db.com/exploits/45548/</a> <a href="https://www.exploit-db.com/exploits/45631/">https://www.exploit-db.com/exploits/45631/</a> <a href="https://www.openwall.com/lists/oss-security/2018/10/06/3">https://www.openwall.com/lists/oss-security/2018/10/06/3</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">git</td> <td>CVE-2019-1353</td> <td class="severity">CRITICAL</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.4-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353</a> <a href="https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v">https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v</a> <a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a> <a href="https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u">https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u</a> <a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a> <a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a> <a href="https://usn.ubuntu.com/usn/usn-4220-1">https://usn.ubuntu.com/usn/usn-4220-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">git</td> <td>CVE-2019-1349</td> <td class="severity">HIGH</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.4-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="https://access.redhat.com/errata/RHSA-2020:0228">https://access.redhat.com/errata/RHSA-2020:0228</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349</a> <a href="https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7">https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7</a> <a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a> <a href="https://linux.oracle.com/cve/CVE-2019-1349.html">https://linux.oracle.com/cve/CVE-2019-1349.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-4356.html">https://linux.oracle.com/errata/ELSA-2019-4356.html</a> <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349</a> <a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a> <a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a> <a href="https://usn.ubuntu.com/usn/usn-4220-1">https://usn.ubuntu.com/usn/usn-4220-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">git</td> <td>CVE-2019-1350</td> <td class="severity">HIGH</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.4-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350</a> <a href="https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x">https://github.com/git/git/security/advisories/GHSA-44fr-r2hj-3f4x</a> <a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a> <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350</a> <a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a> <a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a> <a href="https://security.gentoo.org/glsa/202003-42">https://security.gentoo.org/glsa/202003-42</a> <a href="https://usn.ubuntu.com/usn/usn-4220-1">https://usn.ubuntu.com/usn/usn-4220-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">git</td> <td>CVE-2019-1351</td> <td class="severity">HIGH</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.4-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351</a> <a href="https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f">https://github.com/git/git/security/advisories/GHSA-39hj-fvvf-mq4f</a> <a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a> <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351</a> <a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a> <a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a> <a href="https://usn.ubuntu.com/usn/usn-4220-1">https://usn.ubuntu.com/usn/usn-4220-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">git</td> <td>CVE-2019-1352</td> <td class="severity">HIGH</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.4-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="https://access.redhat.com/errata/RHSA-2020:0228">https://access.redhat.com/errata/RHSA-2020:0228</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352</a> <a href="https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj">https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj</a> <a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a> <a href="https://linux.oracle.com/cve/CVE-2019-1352.html">https://linux.oracle.com/cve/CVE-2019-1352.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-4356.html">https://linux.oracle.com/errata/ELSA-2019-4356.html</a> <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352</a> <a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a> <a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a> <a href="https://usn.ubuntu.com/usn/usn-4220-1">https://usn.ubuntu.com/usn/usn-4220-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">git</td> <td>CVE-2019-1354</td> <td class="severity">HIGH</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.4-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354</a> <a href="https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq">https://github.com/git/git/security/advisories/GHSA-xjx4-8694-q2fq</a> <a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a> <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354</a> <a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a> <a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a> <a href="https://usn.ubuntu.com/usn/usn-4220-1">https://usn.ubuntu.com/usn/usn-4220-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">git</td> <td>CVE-2019-1387</td> <td class="severity">HIGH</td> <td class="pkg-version">2.15.2-r0</td> <td>2.15.4-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html</a> <a href="https://access.redhat.com/errata/RHSA-2019:4356">https://access.redhat.com/errata/RHSA-2019:4356</a> <a href="https://access.redhat.com/errata/RHSA-2020:0002">https://access.redhat.com/errata/RHSA-2020:0002</a> <a href="https://access.redhat.com/errata/RHSA-2020:0124">https://access.redhat.com/errata/RHSA-2020:0124</a> <a href="https://access.redhat.com/errata/RHSA-2020:0228">https://access.redhat.com/errata/RHSA-2020:0228</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387</a> <a href="https://github.com/git/git/security/advisories/GHSA-4wfr-gwrh-8mj2">https://github.com/git/git/security/advisories/GHSA-4wfr-gwrh-8mj2</a> <a href="https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4">https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4</a> <a href="https://linux.oracle.com/cve/CVE-2019-1387.html">https://linux.oracle.com/cve/CVE-2019-1387.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-0124.html">https://linux.oracle.com/errata/ELSA-2020-0124.html</a> <a href="https://lists.debian.org/debian-lts-announce/2020/01/msg00019.html">https://lists.debian.org/debian-lts-announce/2020/01/msg00019.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6UGTEOXWIYSM5KDZL74QD2GK6YQNQCP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6UGTEOXWIYSM5KDZL74QD2GK6YQNQCP/</a> <a href="https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u">https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u</a> <a href="https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/">https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/</a> <a href="https://security.gentoo.org/glsa/202003-30">https://security.gentoo.org/glsa/202003-30</a> <a href="https://security.gentoo.org/glsa/202003-42">https://security.gentoo.org/glsa/202003-42</a> <a href="https://usn.ubuntu.com/usn/usn-4220-1">https://usn.ubuntu.com/usn/usn-4220-1</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">libbz2</td> <td>CVE-2019-12900</td> <td class="severity">CRITICAL</td> <td class="pkg-version">1.0.6-r6</td> <td>1.0.6-r7</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html">http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html">http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html</a> <a href="http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html">http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html</a> <a href="http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html">http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html</a> <a href="https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494">https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900</a> <a href="https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc">https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc</a> <a href="https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E">https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E</a> <a href="https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html">https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html</a> <a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html</a> <a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html</a> <a href="https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html">https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html</a> <a href="https://seclists.org/bugtraq/2019/Aug/4">https://seclists.org/bugtraq/2019/Aug/4</a> <a href="https://seclists.org/bugtraq/2019/Jul/22">https://seclists.org/bugtraq/2019/Jul/22</a> <a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc</a> <a href="https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp;utm_medium=RSS</a> <a href="https://usn.ubuntu.com/4038-1/">https://usn.ubuntu.com/4038-1/</a> <a href="https://usn.ubuntu.com/4038-2/">https://usn.ubuntu.com/4038-2/</a> <a href="https://usn.ubuntu.com/4146-1/">https://usn.ubuntu.com/4146-1/</a> <a href="https://usn.ubuntu.com/4146-2/">https://usn.ubuntu.com/4146-2/</a> <a href="https://usn.ubuntu.com/usn/usn-4038-1">https://usn.ubuntu.com/usn/usn-4038-1</a> <a href="https://usn.ubuntu.com/usn/usn-4038-2">https://usn.ubuntu.com/usn/usn-4038-2</a> <a href="https://usn.ubuntu.com/usn/usn-4038-3">https://usn.ubuntu.com/usn/usn-4038-3</a> <a href="https://usn.ubuntu.com/usn/usn-4038-4">https://usn.ubuntu.com/usn/usn-4038-4</a> <a href="https://usn.ubuntu.com/usn/usn-4146-1">https://usn.ubuntu.com/usn/usn-4146-1</a> <a href="https://usn.ubuntu.com/usn/usn-4146-2">https://usn.ubuntu.com/usn/usn-4146-2</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">libcurl</td> <td>CVE-2018-16839</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r1</td> <td class="links" data-more-links="off"> <a href="http://www.securitytracker.com/id/1042012">http://www.securitytracker.com/id/1042012</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839</a> <a href="https://curl.haxx.se/docs/CVE-2018-16839.html">https://curl.haxx.se/docs/CVE-2018-16839.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839</a> <a href="https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5">https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html">https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://usn.ubuntu.com/3805-1/">https://usn.ubuntu.com/3805-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3805-1">https://usn.ubuntu.com/usn/usn-3805-1</a> <a href="https://www.debian.org/security/2018/dsa-4331">https://www.debian.org/security/2018/dsa-4331</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">libcurl</td> <td>CVE-2018-16840</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r1</td> <td class="links" data-more-links="off"> <a href="http://www.securitytracker.com/id/1042013">http://www.securitytracker.com/id/1042013</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840</a> <a href="https://curl.haxx.se/docs/CVE-2018-16840.html">https://curl.haxx.se/docs/CVE-2018-16840.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840</a> <a href="https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f">https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://usn.ubuntu.com/3805-1/">https://usn.ubuntu.com/3805-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3805-1">https://usn.ubuntu.com/usn/usn-3805-1</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">libcurl</td> <td>CVE-2018-16842</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r1</td> <td class="links" data-more-links="off"> <a href="http://www.securitytracker.com/id/1042014">http://www.securitytracker.com/id/1042014</a> <a href="https://access.redhat.com/errata/RHSA-2019:2181">https://access.redhat.com/errata/RHSA-2019:2181</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842</a> <a href="https://curl.haxx.se/docs/CVE-2018-16842.html">https://curl.haxx.se/docs/CVE-2018-16842.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842</a> <a href="https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211">https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211</a> <a href="https://linux.oracle.com/cve/CVE-2018-16842.html">https://linux.oracle.com/cve/CVE-2018-16842.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-2181.html">https://linux.oracle.com/errata/ELSA-2019-2181.html</a> <a href="https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html">https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://usn.ubuntu.com/3805-1/">https://usn.ubuntu.com/3805-1/</a> <a href="https://usn.ubuntu.com/3805-2/">https://usn.ubuntu.com/3805-2/</a> <a href="https://usn.ubuntu.com/usn/usn-3805-1">https://usn.ubuntu.com/usn/usn-3805-1</a> <a href="https://usn.ubuntu.com/usn/usn-3805-2">https://usn.ubuntu.com/usn/usn-3805-2</a> <a href="https://www.debian.org/security/2018/dsa-4331">https://www.debian.org/security/2018/dsa-4331</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">libcurl</td> <td>CVE-2019-3822</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r2</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/106950">http://www.securityfocus.com/bid/106950</a> <a href="https://access.redhat.com/errata/RHSA-2019:3701">https://access.redhat.com/errata/RHSA-2019:3701</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf</a> <a href="https://curl.haxx.se/docs/CVE-2019-3822.html">https://curl.haxx.se/docs/CVE-2019-3822.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822</a> <a href="https://linux.oracle.com/cve/CVE-2019-3822.html">https://linux.oracle.com/cve/CVE-2019-3822.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-3701.html">https://linux.oracle.com/errata/ELSA-2019-3701.html</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://security.netapp.com/advisory/ntap-20190315-0001/">https://security.netapp.com/advisory/ntap-20190315-0001/</a> <a href="https://security.netapp.com/advisory/ntap-20190719-0004/">https://security.netapp.com/advisory/ntap-20190719-0004/</a> <a href="https://support.f5.com/csp/article/K84141449">https://support.f5.com/csp/article/K84141449</a> <a href="https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp;utm_medium=RSS</a> <a href="https://usn.ubuntu.com/3882-1/">https://usn.ubuntu.com/3882-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3882-1">https://usn.ubuntu.com/usn/usn-3882-1</a> <a href="https://www.debian.org/security/2019/dsa-4386">https://www.debian.org/security/2019/dsa-4386</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">libcurl</td> <td>CVE-2019-5481</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r3</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html</a> <a href="https://curl.haxx.se/docs/CVE-2019-5481.html">https://curl.haxx.se/docs/CVE-2019-5481.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481</a> <a href="https://linux.oracle.com/cve/CVE-2019-5481.html">https://linux.oracle.com/cve/CVE-2019-5481.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-1792.html">https://linux.oracle.com/errata/ELSA-2020-1792.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/</a> <a href="https://seclists.org/bugtraq/2020/Feb/36">https://seclists.org/bugtraq/2020/Feb/36</a> <a href="https://security.gentoo.org/glsa/202003-29">https://security.gentoo.org/glsa/202003-29</a> <a href="https://security.netapp.com/advisory/ntap-20191004-0003/">https://security.netapp.com/advisory/ntap-20191004-0003/</a> <a href="https://usn.ubuntu.com/usn/usn-4129-1">https://usn.ubuntu.com/usn/usn-4129-1</a> <a href="https://www.debian.org/security/2020/dsa-4633">https://www.debian.org/security/2020/dsa-4633</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">libcurl</td> <td>CVE-2019-5482</td> <td class="severity">CRITICAL</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r3</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html</a> <a href="https://curl.haxx.se/docs/CVE-2019-5482.html">https://curl.haxx.se/docs/CVE-2019-5482.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482</a> <a href="https://linux.oracle.com/cve/CVE-2019-5482.html">https://linux.oracle.com/cve/CVE-2019-5482.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-5562.html">https://linux.oracle.com/errata/ELSA-2020-5562.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/</a> <a href="https://seclists.org/bugtraq/2020/Feb/36">https://seclists.org/bugtraq/2020/Feb/36</a> <a href="https://security.gentoo.org/glsa/202003-29">https://security.gentoo.org/glsa/202003-29</a> <a href="https://security.netapp.com/advisory/ntap-20191004-0003/">https://security.netapp.com/advisory/ntap-20191004-0003/</a> <a href="https://security.netapp.com/advisory/ntap-20200416-0003/">https://security.netapp.com/advisory/ntap-20200416-0003/</a> <a href="https://usn.ubuntu.com/usn/usn-4129-1">https://usn.ubuntu.com/usn/usn-4129-1</a> <a href="https://usn.ubuntu.com/usn/usn-4129-2">https://usn.ubuntu.com/usn/usn-4129-2</a> <a href="https://www.debian.org/security/2020/dsa-4633">https://www.debian.org/security/2020/dsa-4633</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">libcurl</td> <td>CVE-2018-16890</td> <td class="severity">HIGH</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r2</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/106947">http://www.securityfocus.com/bid/106947</a> <a href="https://access.redhat.com/errata/RHSA-2019:3701">https://access.redhat.com/errata/RHSA-2019:3701</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf</a> <a href="https://curl.haxx.se/docs/CVE-2018-16890.html">https://curl.haxx.se/docs/CVE-2018-16890.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890</a> <a href="https://linux.oracle.com/cve/CVE-2018-16890.html">https://linux.oracle.com/cve/CVE-2018-16890.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-3701.html">https://linux.oracle.com/errata/ELSA-2019-3701.html</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://security.netapp.com/advisory/ntap-20190315-0001/">https://security.netapp.com/advisory/ntap-20190315-0001/</a> <a href="https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp;utm_medium=RSS</a> <a href="https://usn.ubuntu.com/3882-1/">https://usn.ubuntu.com/3882-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3882-1">https://usn.ubuntu.com/usn/usn-3882-1</a> <a href="https://www.debian.org/security/2019/dsa-4386">https://www.debian.org/security/2019/dsa-4386</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">libcurl</td> <td>CVE-2019-3823</td> <td class="severity">HIGH</td> <td class="pkg-version">7.61.1-r0</td> <td>7.61.1-r2</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/106950">http://www.securityfocus.com/bid/106950</a> <a href="https://access.redhat.com/errata/RHSA-2019:3701">https://access.redhat.com/errata/RHSA-2019:3701</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf</a> <a href="https://curl.haxx.se/docs/CVE-2019-3823.html">https://curl.haxx.se/docs/CVE-2019-3823.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823</a> <a href="https://linux.oracle.com/cve/CVE-2019-3823.html">https://linux.oracle.com/cve/CVE-2019-3823.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-3701.html">https://linux.oracle.com/errata/ELSA-2019-3701.html</a> <a href="https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E">https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E</a> <a href="https://security.gentoo.org/glsa/201903-03">https://security.gentoo.org/glsa/201903-03</a> <a href="https://security.netapp.com/advisory/ntap-20190315-0001/">https://security.netapp.com/advisory/ntap-20190315-0001/</a> <a href="https://usn.ubuntu.com/3882-1/">https://usn.ubuntu.com/3882-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3882-1">https://usn.ubuntu.com/usn/usn-3882-1</a> <a href="https://www.debian.org/security/2019/dsa-4386">https://www.debian.org/security/2019/dsa-4386</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">libxml2</td> <td>CVE-2018-14404</td> <td class="severity">HIGH</td> <td class="pkg-version">2.9.7-r0</td> <td>2.9.8-r1</td> <td class="links" data-more-links="off"> <a href="https://access.redhat.com/errata/RHSA-2019:1543">https://access.redhat.com/errata/RHSA-2019:1543</a> <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1595985">https://bugzilla.redhat.com/show_bug.cgi?id=1595985</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404</a> <a href="https://github.com/advisories/GHSA-6qvp-r6r3-9p7h">https://github.com/advisories/GHSA-6qvp-r6r3-9p7h</a> <a href="https://github.com/sparklemotion/nokogiri/issues/1785">https://github.com/sparklemotion/nokogiri/issues/1785</a> <a href="https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74">https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74</a> <a href="https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594">https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594</a> <a href="https://gitlab.gnome.org/GNOME/libxml2/issues/10">https://gitlab.gnome.org/GNOME/libxml2/issues/10</a> <a href="https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ">https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ</a> <a href="https://linux.oracle.com/cve/CVE-2018-14404.html">https://linux.oracle.com/cve/CVE-2018-14404.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-1827.html">https://linux.oracle.com/errata/ELSA-2020-1827.html</a> <a href="https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html">https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html</a> <a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">https://nvd.nist.gov/vuln/detail/CVE-2018-14404</a> <a href="https://security.netapp.com/advisory/ntap-20190719-0002/">https://security.netapp.com/advisory/ntap-20190719-0002/</a> <a href="https://usn.ubuntu.com/3739-1/">https://usn.ubuntu.com/3739-1/</a> <a href="https://usn.ubuntu.com/3739-2/">https://usn.ubuntu.com/3739-2/</a> <a href="https://usn.ubuntu.com/usn/usn-3739-1">https://usn.ubuntu.com/usn/usn-3739-1</a> <a href="https://usn.ubuntu.com/usn/usn-3739-2">https://usn.ubuntu.com/usn/usn-3739-2</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">musl</td> <td>CVE-2019-14697</td> <td class="severity">CRITICAL</td> <td class="pkg-version">1.1.18-r3</td> <td>1.1.18-r4</td> <td class="links" data-more-links="off"> <a href="http://www.openwall.com/lists/oss-security/2019/08/06/4">http://www.openwall.com/lists/oss-security/2019/08/06/4</a> <a href="https://security.gentoo.org/glsa/202003-13">https://security.gentoo.org/glsa/202003-13</a> <a href="https://www.openwall.com/lists/musl/2019/08/06/1">https://www.openwall.com/lists/musl/2019/08/06/1</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">musl-utils</td> <td>CVE-2019-14697</td> <td class="severity">CRITICAL</td> <td class="pkg-version">1.1.18-r3</td> <td>1.1.18-r4</td> <td class="links" data-more-links="off"> <a href="http://www.openwall.com/lists/oss-security/2019/08/06/4">http://www.openwall.com/lists/oss-security/2019/08/06/4</a> <a href="https://security.gentoo.org/glsa/202003-13">https://security.gentoo.org/glsa/202003-13</a> <a href="https://www.openwall.com/lists/musl/2019/08/06/1">https://www.openwall.com/lists/musl/2019/08/06/1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">patch</td> <td>CVE-2018-1000156</td> <td class="severity">HIGH</td> <td class="pkg-version">2.7.5-r2</td> <td>2.7.6-r0</td> <td class="links" data-more-links="off"> <a href="http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html">http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html</a> <a href="http://rachelbythebay.com/w/2018/04/05/bangpatch/">http://rachelbythebay.com/w/2018/04/05/bangpatch/</a> <a href="https://access.redhat.com/errata/RHSA-2018:1199">https://access.redhat.com/errata/RHSA-2018:1199</a> <a href="https://access.redhat.com/errata/RHSA-2018:1200">https://access.redhat.com/errata/RHSA-2018:1200</a> <a href="https://access.redhat.com/errata/RHSA-2018:2091">https://access.redhat.com/errata/RHSA-2018:2091</a> <a href="https://access.redhat.com/errata/RHSA-2018:2092">https://access.redhat.com/errata/RHSA-2018:2092</a> <a href="https://access.redhat.com/errata/RHSA-2018:2093">https://access.redhat.com/errata/RHSA-2018:2093</a> <a href="https://access.redhat.com/errata/RHSA-2018:2094">https://access.redhat.com/errata/RHSA-2018:2094</a> <a href="https://access.redhat.com/errata/RHSA-2018:2095">https://access.redhat.com/errata/RHSA-2018:2095</a> <a href="https://access.redhat.com/errata/RHSA-2018:2096">https://access.redhat.com/errata/RHSA-2018:2096</a> <a href="https://access.redhat.com/errata/RHSA-2018:2097">https://access.redhat.com/errata/RHSA-2018:2097</a> <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156</a> <a href="https://linux.oracle.com/cve/CVE-2018-1000156.html">https://linux.oracle.com/cve/CVE-2018-1000156.html</a> <a href="https://linux.oracle.com/errata/ELSA-2018-1200.html">https://linux.oracle.com/errata/ELSA-2018-1200.html</a> <a href="https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html">https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html</a> <a href="https://rachelbythebay.com/w/2018/04/05/bangpatch/">https://rachelbythebay.com/w/2018/04/05/bangpatch/</a> <a href="https://savannah.gnu.org/bugs/index.php?53566">https://savannah.gnu.org/bugs/index.php?53566</a> <a href="https://seclists.org/bugtraq/2019/Aug/29">https://seclists.org/bugtraq/2019/Aug/29</a> <a href="https://seclists.org/bugtraq/2019/Jul/54">https://seclists.org/bugtraq/2019/Jul/54</a> <a href="https://security.gentoo.org/glsa/201904-17">https://security.gentoo.org/glsa/201904-17</a> <a href="https://twitter.com/kurtseifried/status/982028968877436928">https://twitter.com/kurtseifried/status/982028968877436928</a> <a href="https://usn.ubuntu.com/3624-1/">https://usn.ubuntu.com/3624-1/</a> <a href="https://usn.ubuntu.com/3624-2/">https://usn.ubuntu.com/3624-2/</a> <a href="https://usn.ubuntu.com/usn/usn-3624-1">https://usn.ubuntu.com/usn/usn-3624-1</a> <a href="https://usn.ubuntu.com/usn/usn-3624-2">https://usn.ubuntu.com/usn/usn-3624-2</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">patch</td> <td>CVE-2018-6952</td> <td class="severity">HIGH</td> <td class="pkg-version">2.7.5-r2</td> <td>2.7.6-r0</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/103047">http://www.securityfocus.com/bid/103047</a> <a href="https://access.redhat.com/errata/RHSA-2019:2033">https://access.redhat.com/errata/RHSA-2019:2033</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952</a> <a href="https://linux.oracle.com/cve/CVE-2018-6952.html">https://linux.oracle.com/cve/CVE-2018-6952.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-2033.html">https://linux.oracle.com/errata/ELSA-2019-2033.html</a> <a href="https://savannah.gnu.org/bugs/index.php?53133">https://savannah.gnu.org/bugs/index.php?53133</a> <a href="https://security.gentoo.org/glsa/201904-17">https://security.gentoo.org/glsa/201904-17</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">patch</td> <td>CVE-2019-13638</td> <td class="severity">HIGH</td> <td class="pkg-version">2.7.5-r2</td> <td>2.7.6-r0</td> <td class="links" data-more-links="off"> <a href="http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html">http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html</a> <a href="https://access.redhat.com/errata/RHSA-2019:2798">https://access.redhat.com/errata/RHSA-2019:2798</a> <a href="https://access.redhat.com/errata/RHSA-2019:2964">https://access.redhat.com/errata/RHSA-2019:2964</a> <a href="https://access.redhat.com/errata/RHSA-2019:3757">https://access.redhat.com/errata/RHSA-2019:3757</a> <a href="https://access.redhat.com/errata/RHSA-2019:3758">https://access.redhat.com/errata/RHSA-2019:3758</a> <a href="https://access.redhat.com/errata/RHSA-2019:4061">https://access.redhat.com/errata/RHSA-2019:4061</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13638">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13638</a> <a href="https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0">https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0</a> <a href="https://github.com/irsl/gnu-patch-vulnerabilities">https://github.com/irsl/gnu-patch-vulnerabilities</a> <a href="https://linux.oracle.com/cve/CVE-2019-13638.html">https://linux.oracle.com/cve/CVE-2019-13638.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-2964.html">https://linux.oracle.com/errata/ELSA-2019-2964.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/</a> <a href="https://seclists.org/bugtraq/2019/Aug/29">https://seclists.org/bugtraq/2019/Aug/29</a> <a href="https://seclists.org/bugtraq/2019/Jul/54">https://seclists.org/bugtraq/2019/Jul/54</a> <a href="https://security-tracker.debian.org/tracker/CVE-2019-13638">https://security-tracker.debian.org/tracker/CVE-2019-13638</a> <a href="https://security.gentoo.org/glsa/201908-22">https://security.gentoo.org/glsa/201908-22</a> <a href="https://security.netapp.com/advisory/ntap-20190828-0001/">https://security.netapp.com/advisory/ntap-20190828-0001/</a> <a href="https://usn.ubuntu.com/usn/usn-4071-1">https://usn.ubuntu.com/usn/usn-4071-1</a> <a href="https://usn.ubuntu.com/usn/usn-4071-2">https://usn.ubuntu.com/usn/usn-4071-2</a> <a href="https://www.debian.org/security/2019/dsa-4489">https://www.debian.org/security/2019/dsa-4489</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">sqlite-libs</td> <td>CVE-2019-8457</td> <td class="severity">CRITICAL</td> <td class="pkg-version">3.21.0-r1</td> <td>3.25.3-r1</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457</a> <a href="https://linux.oracle.com/cve/CVE-2019-8457.html">https://linux.oracle.com/cve/CVE-2019-8457.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/</a> <a href="https://security.netapp.com/advisory/ntap-20190606-0002/">https://security.netapp.com/advisory/ntap-20190606-0002/</a> <a href="https://usn.ubuntu.com/4004-1/">https://usn.ubuntu.com/4004-1/</a> <a href="https://usn.ubuntu.com/4004-2/">https://usn.ubuntu.com/4004-2/</a> <a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a> <a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a> <a href="https://usn.ubuntu.com/usn/usn-4004-1">https://usn.ubuntu.com/usn/usn-4004-1</a> <a href="https://usn.ubuntu.com/usn/usn-4004-2">https://usn.ubuntu.com/usn/usn-4004-2</a> <a href="https://usn.ubuntu.com/usn/usn-4019-1">https://usn.ubuntu.com/usn/usn-4019-1</a> <a href="https://usn.ubuntu.com/usn/usn-4019-2">https://usn.ubuntu.com/usn/usn-4019-2</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a> <a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a> <a href="https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html">https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html</a> <a href="https://www.sqlite.org/releaselog/3_28_0.html">https://www.sqlite.org/releaselog/3_28_0.html</a> <a href="https://www.sqlite.org/src/info/90acdbfce9c08858">https://www.sqlite.org/src/info/90acdbfce9c08858</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">sqlite-libs</td> <td>CVE-2018-20346</td> <td class="severity">HIGH</td> <td class="pkg-version">3.21.0-r1</td> <td>3.25.3-r0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html</a> <a href="http://www.securityfocus.com/bid/106323">http://www.securityfocus.com/bid/106323</a> <a href="https://access.redhat.com/articles/3758321">https://access.redhat.com/articles/3758321</a> <a href="https://blade.tencent.com/magellan/index_en.html">https://blade.tencent.com/magellan/index_en.html</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1659379">https://bugzilla.redhat.com/show_bug.cgi?id=1659379</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1659677">https://bugzilla.redhat.com/show_bug.cgi?id=1659677</a> <a href="https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html">https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html</a> <a href="https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e">https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e</a> <a href="https://crbug.com/900910">https://crbug.com/900910</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346</a> <a href="https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html">https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html</a> <a href="https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html">https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html</a> <a href="https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html">https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/</a> <a href="https://news.ycombinator.com/item?id=18685296">https://news.ycombinator.com/item?id=18685296</a> <a href="https://security.gentoo.org/glsa/201904-21">https://security.gentoo.org/glsa/201904-21</a> <a href="https://sqlite.org/src/info/940f2adc8541a838">https://sqlite.org/src/info/940f2adc8541a838</a> <a href="https://sqlite.org/src/info/d44318f59044162e">https://sqlite.org/src/info/d44318f59044162e</a> <a href="https://support.apple.com/HT209443">https://support.apple.com/HT209443</a> <a href="https://support.apple.com/HT209446">https://support.apple.com/HT209446</a> <a href="https://support.apple.com/HT209447">https://support.apple.com/HT209447</a> <a href="https://support.apple.com/HT209448">https://support.apple.com/HT209448</a> <a href="https://support.apple.com/HT209450">https://support.apple.com/HT209450</a> <a href="https://support.apple.com/HT209451">https://support.apple.com/HT209451</a> <a href="https://usn.ubuntu.com/4019-1/">https://usn.ubuntu.com/4019-1/</a> <a href="https://usn.ubuntu.com/4019-2/">https://usn.ubuntu.com/4019-2/</a> <a href="https://usn.ubuntu.com/usn/usn-4019-1">https://usn.ubuntu.com/usn/usn-4019-1</a> <a href="https://usn.ubuntu.com/usn/usn-4019-2">https://usn.ubuntu.com/usn/usn-4019-2</a> <a href="https://worthdoingbadly.com/sqlitebug/">https://worthdoingbadly.com/sqlitebug/</a> <a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc">https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc</a> <a href="https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html">https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html</a> <a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a> <a href="https://www.sqlite.org/releaselog/3_25_3.html">https://www.sqlite.org/releaselog/3_25_3.html</a> <a href="https://www.synology.com/security/advisory/Synology_SA_18_61">https://www.synology.com/security/advisory/Synology_SA_18_61</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">subversion</td> <td>CVE-2019-0203</td> <td class="severity">HIGH</td> <td class="pkg-version">1.9.7-r0</td> <td>1.9.12-r0</td> <td class="links" data-more-links="off"> <a href="http://subversion.apache.org/security/CVE-2019-0203-advisory.txt">http://subversion.apache.org/security/CVE-2019-0203-advisory.txt</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203</a> <a href="https://linux.oracle.com/cve/CVE-2019-0203.html">https://linux.oracle.com/cve/CVE-2019-0203.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-2512.html">https://linux.oracle.com/errata/ELSA-2019-2512.html</a> <a href="https://subversion.apache.org/security/CVE-2019-0203-advisory.txt">https://subversion.apache.org/security/CVE-2019-0203-advisory.txt</a> <a href="https://usn.ubuntu.com/usn/usn-4082-1">https://usn.ubuntu.com/usn/usn-4082-1</a> <a href="https://usn.ubuntu.com/usn/usn-4082-2">https://usn.ubuntu.com/usn/usn-4082-2</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">subversion-libs</td> <td>CVE-2019-0203</td> <td class="severity">HIGH</td> <td class="pkg-version">1.9.7-r0</td> <td>1.9.12-r0</td> <td class="links" data-more-links="off"> <a href="http://subversion.apache.org/security/CVE-2019-0203-advisory.txt">http://subversion.apache.org/security/CVE-2019-0203-advisory.txt</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0203</a> <a href="https://linux.oracle.com/cve/CVE-2019-0203.html">https://linux.oracle.com/cve/CVE-2019-0203.html</a> <a href="https://linux.oracle.com/errata/ELSA-2019-2512.html">https://linux.oracle.com/errata/ELSA-2019-2512.html</a> <a href="https://subversion.apache.org/security/CVE-2019-0203-advisory.txt">https://subversion.apache.org/security/CVE-2019-0203-advisory.txt</a> <a href="https://usn.ubuntu.com/usn/usn-4082-1">https://usn.ubuntu.com/usn/usn-4082-1</a> <a href="https://usn.ubuntu.com/usn/usn-4082-2">https://usn.ubuntu.com/usn/usn-4082-2</a> </td> </tr> <tr class="group-header"><th colspan="6">npm</th></tr> <tr class="sub-header"> <th>Package</th> <th>Vulnerability ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> <th>Links</th> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">lodash</td> <td>CVE-2019-10744</td> <td class="severity">CRITICAL</td> <td class="pkg-version">4.17.4</td> <td>4.17.12</td> <td class="links" data-more-links="off"> <a href="https://access.redhat.com/errata/RHSA-2019:3024">https://access.redhat.com/errata/RHSA-2019:3024</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10744">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10744</a> <a href="https://github.com/advisories/GHSA-jf85-cpcp-j695">https://github.com/advisories/GHSA-jf85-cpcp-j695</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-10744">https://nvd.nist.gov/vuln/detail/CVE-2019-10744</a> <a href="https://security.netapp.com/advisory/ntap-20191004-0005/">https://security.netapp.com/advisory/ntap-20191004-0005/</a> <a href="https://snyk.io/vuln/SNYK-JS-LODASH-450202">https://snyk.io/vuln/SNYK-JS-LODASH-450202</a> <a href="https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS">https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS</a> <a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a> <a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">lodash</td> <td>CVE-2018-16487</td> <td class="severity">HIGH</td> <td class="pkg-version">4.17.4</td> <td>4.17.11</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16487</a> <a href="https://github.com/advisories/GHSA-4xc9-xhrj-v574">https://github.com/advisories/GHSA-4xc9-xhrj-v574</a> <a href="https://hackerone.com/reports/380873">https://hackerone.com/reports/380873</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-16487">https://nvd.nist.gov/vuln/detail/CVE-2018-16487</a> <a href="https://security.netapp.com/advisory/ntap-20190919-0004/">https://security.netapp.com/advisory/ntap-20190919-0004/</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">lodash</td> <td>CVE-2020-8203</td> <td class="severity">HIGH</td> <td class="pkg-version">4.17.4</td> <td>4.17.19</td> <td class="links" data-more-links="off"> <a href="https://github.com/advisories/GHSA-p6mc-m468-83gw">https://github.com/advisories/GHSA-p6mc-m468-83gw</a> <a href="https://github.com/lodash/lodash/issues/4874">https://github.com/lodash/lodash/issues/4874</a> <a href="https://hackerone.com/reports/712065">https://hackerone.com/reports/712065</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8203">https://nvd.nist.gov/vuln/detail/CVE-2020-8203</a> <a href="https://security.netapp.com/advisory/ntap-20200724-0006/">https://security.netapp.com/advisory/ntap-20200724-0006/</a> <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">lodash</td> <td>CVE-2021-23337</td> <td class="severity">HIGH</td> <td class="pkg-version">4.17.4</td> <td>4.17.21</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23337</a> <a href="https://github.com/advisories/GHSA-35jh-r3h4-6jhm">https://github.com/advisories/GHSA-35jh-r3h4-6jhm</a> <a href="https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851">https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23337">https://nvd.nist.gov/vuln/detail/CVE-2021-23337</a> <a href="https://security.netapp.com/advisory/ntap-20210312-0006/">https://security.netapp.com/advisory/ntap-20210312-0006/</a> <a href="https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932">https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932</a> <a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930</a> <a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928</a> <a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931</a> <a href="https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929">https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929</a> <a href="https://snyk.io/vuln/SNYK-JS-LODASH-1040724">https://snyk.io/vuln/SNYK-JS-LODASH-1040724</a> </td> </tr> <tr class="group-header"><th colspan="6">composer</th></tr> <tr class="sub-header"> <th>Package</th> <th>Vulnerability ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> <th>Links</th> </tr> <tr class="severity-HIGH"> <td class="pkg-name">guzzlehttp/guzzle</td> <td>CVE-2016-5385</td> <td class="severity">HIGH</td> <td class="pkg-version">6.2.0</td> <td>4.2.4, 5.3.1, 6.2.1</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html">http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html</a> <a href="http://php.net/ChangeLog-7.php#7.0.9">http://php.net/ChangeLog-7.php#7.0.9</a> <a href="http://rhn.redhat.com/errata/RHSA-2016-1609.html">http://rhn.redhat.com/errata/RHSA-2016-1609.html</a> <a href="http://rhn.redhat.com/errata/RHSA-2016-1610.html">http://rhn.redhat.com/errata/RHSA-2016-1610.html</a> <a href="http://rhn.redhat.com/errata/RHSA-2016-1611.html">http://rhn.redhat.com/errata/RHSA-2016-1611.html</a> <a href="http://rhn.redhat.com/errata/RHSA-2016-1612.html">http://rhn.redhat.com/errata/RHSA-2016-1612.html</a> <a href="http://rhn.redhat.com/errata/RHSA-2016-1613.html">http://rhn.redhat.com/errata/RHSA-2016-1613.html</a> <a href="http://www.debian.org/security/2016/dsa-3631">http://www.debian.org/security/2016/dsa-3631</a> <a href="http://www.kb.cert.org/vuls/id/797896">http://www.kb.cert.org/vuls/id/797896</a> <a href="http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html">http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html</a> <a href="http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html">http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html</a> <a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html</a> <a href="http://www.securityfocus.com/bid/91821">http://www.securityfocus.com/bid/91821</a> <a href="http://www.securitytracker.com/id/1036335">http://www.securitytracker.com/id/1036335</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1353794">https://bugzilla.redhat.com/show_bug.cgi?id=1353794</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385</a> <a href="https://github.com/guzzle/guzzle/releases/tag/6.2.1">https://github.com/guzzle/guzzle/releases/tag/6.2.1</a> <a href="https://github.com/humbug/file_get_contents/releases/tag/1.1.2">https://github.com/humbug/file_get_contents/releases/tag/1.1.2</a> <a href="https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us">https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us</a> <a href="https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149">https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149</a> <a href="https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297">https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297</a> <a href="https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722">https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722</a> <a href="https://httpoxy.org/">https://httpoxy.org/</a> <a href="https://linux.oracle.com/cve/CVE-2016-5385.html">https://linux.oracle.com/cve/CVE-2016-5385.html</a> <a href="https://linux.oracle.com/errata/ELSA-2016-1613.html">https://linux.oracle.com/errata/ELSA-2016-1613.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/</a> <a href="https://security.gentoo.org/glsa/201611-22">https://security.gentoo.org/glsa/201611-22</a> <a href="https://usn.ubuntu.com/usn/usn-3045-1">https://usn.ubuntu.com/usn/usn-3045-1</a> <a href="https://www.drupal.org/SA-CORE-2016-003">https://www.drupal.org/SA-CORE-2016-003</a> </td> </tr> <tr class="group-header"><th colspan="6">pipenv</th></tr> <tr class="sub-header"> <th>Package</th> <th>Vulnerability ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> <th>Links</th> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">django</td> <td>CVE-2019-19844</td> <td class="severity">CRITICAL</td> <td class="pkg-version">2.0.9</td> <td>3.0.1, 2.2.9, 1.11.27</td> <td class="links" data-more-links="off"> <a href="http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html">http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19844</a> <a href="https://docs.djangoproject.com/en/dev/releases/security/">https://docs.djangoproject.com/en/dev/releases/security/</a> <a href="https://github.com/advisories/GHSA-vfq6-hq5r-27r6">https://github.com/advisories/GHSA-vfq6-hq5r-27r6</a> <a href="https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0">https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-19844">https://nvd.nist.gov/vuln/detail/CVE-2019-19844</a> <a href="https://seclists.org/bugtraq/2020/Jan/9">https://seclists.org/bugtraq/2020/Jan/9</a> <a href="https://security.gentoo.org/glsa/202004-17">https://security.gentoo.org/glsa/202004-17</a> <a href="https://security.netapp.com/advisory/ntap-20200110-0003/">https://security.netapp.com/advisory/ntap-20200110-0003/</a> <a href="https://usn.ubuntu.com/4224-1/">https://usn.ubuntu.com/4224-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4224-1">https://usn.ubuntu.com/usn/usn-4224-1</a> <a href="https://www.debian.org/security/2020/dsa-4598">https://www.debian.org/security/2020/dsa-4598</a> <a href="https://www.djangoproject.com/weblog/2019/dec/18/security-releases/">https://www.djangoproject.com/weblog/2019/dec/18/security-releases/</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">django</td> <td>CVE-2020-7471</td> <td class="severity">CRITICAL</td> <td class="pkg-version">2.0.9</td> <td>3.0.3, 2.2.10, 1.11.28</td> <td class="links" data-more-links="off"> <a href="http://www.openwall.com/lists/oss-security/2020/02/03/1">http://www.openwall.com/lists/oss-security/2020/02/03/1</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7471">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7471</a> <a href="https://docs.djangoproject.com/en/3.0/releases/security/">https://docs.djangoproject.com/en/3.0/releases/security/</a> <a href="https://github.com/advisories/GHSA-hmr4-m2h5-33qx">https://github.com/advisories/GHSA-hmr4-m2h5-33qx</a> <a href="https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136">https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136</a> <a href="https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI">https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7471">https://nvd.nist.gov/vuln/detail/CVE-2020-7471</a> <a href="https://seclists.org/bugtraq/2020/Feb/30">https://seclists.org/bugtraq/2020/Feb/30</a> <a href="https://security.gentoo.org/glsa/202004-17">https://security.gentoo.org/glsa/202004-17</a> <a href="https://security.netapp.com/advisory/ntap-20200221-0006/">https://security.netapp.com/advisory/ntap-20200221-0006/</a> <a href="https://usn.ubuntu.com/4264-1/">https://usn.ubuntu.com/4264-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4264-1">https://usn.ubuntu.com/usn/usn-4264-1</a> <a href="https://www.debian.org/security/2020/dsa-4629">https://www.debian.org/security/2020/dsa-4629</a> <a href="https://www.djangoproject.com/weblog/2020/feb/03/security-releases/">https://www.djangoproject.com/weblog/2020/feb/03/security-releases/</a> <a href="https://www.openwall.com/lists/oss-security/2020/02/03/1">https://www.openwall.com/lists/oss-security/2020/02/03/1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">django</td> <td>CVE-2019-6975</td> <td class="severity">HIGH</td> <td class="pkg-version">2.0.9</td> <td>2.1.6, 2.0.11, 1.11.19</td> <td class="links" data-more-links="off"> <a href="http://www.securityfocus.com/bid/106964">http://www.securityfocus.com/bid/106964</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6975">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6975</a> <a href="https://docs.djangoproject.com/en/dev/releases/security/">https://docs.djangoproject.com/en/dev/releases/security/</a> <a href="https://github.com/advisories/GHSA-wh4h-v3f2-r2pp">https://github.com/advisories/GHSA-wh4h-v3f2-r2pp</a> <a href="https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ">https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-6975">https://nvd.nist.gov/vuln/detail/CVE-2019-6975</a> <a href="https://seclists.org/bugtraq/2019/Jul/10">https://seclists.org/bugtraq/2019/Jul/10</a> <a href="https://usn.ubuntu.com/3890-1/">https://usn.ubuntu.com/3890-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3890-1">https://usn.ubuntu.com/usn/usn-3890-1</a> <a href="https://www.debian.org/security/2019/dsa-4476">https://www.debian.org/security/2019/dsa-4476</a> <a href="https://www.djangoproject.com/weblog/2019/feb/11/security-releases/">https://www.djangoproject.com/weblog/2019/feb/11/security-releases/</a> <a href="https://www.openwall.com/lists/oss-security/2019/02/11/1">https://www.openwall.com/lists/oss-security/2019/02/11/1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">django</td> <td>CVE-2020-9402</td> <td class="severity">HIGH</td> <td class="pkg-version">2.0.9</td> <td>3.0.4, 2.2.11, 1.11.29</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402</a> <a href="https://docs.djangoproject.com/en/3.0/releases/security/">https://docs.djangoproject.com/en/3.0/releases/security/</a> <a href="https://github.com/advisories/GHSA-3gh2-xw74-jmcw">https://github.com/advisories/GHSA-3gh2-xw74-jmcw</a> <a href="https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY">https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-9402">https://nvd.nist.gov/vuln/detail/CVE-2020-9402</a> <a href="https://security.gentoo.org/glsa/202004-17">https://security.gentoo.org/glsa/202004-17</a> <a href="https://security.netapp.com/advisory/ntap-20200327-0004/">https://security.netapp.com/advisory/ntap-20200327-0004/</a> <a href="https://usn.ubuntu.com/4296-1/">https://usn.ubuntu.com/4296-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4296-1">https://usn.ubuntu.com/usn/usn-4296-1</a> <a href="https://www.debian.org/security/2020/dsa-4705">https://www.debian.org/security/2020/dsa-4705</a> <a href="https://www.djangoproject.com/weblog/2020/mar/04/security-releases/">https://www.djangoproject.com/weblog/2020/mar/04/security-releases/</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">httplib2</td> <td>CVE-2021-21240</td> <td class="severity">HIGH</td> <td class="pkg-version">0.12.1</td> <td>0.19.0</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21240">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21240</a> <a href="https://github.com/advisories/GHSA-93xj-8mrv-444m">https://github.com/advisories/GHSA-93xj-8mrv-444m</a> <a href="https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc">https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc</a> <a href="https://github.com/httplib2/httplib2/pull/182">https://github.com/httplib2/httplib2/pull/182</a> <a href="https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m">https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21240">https://nvd.nist.gov/vuln/detail/CVE-2021-21240</a> <a href="https://pypi.org/project/httplib2">https://pypi.org/project/httplib2</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">py</td> <td>CVE-2020-29651</td> <td class="severity">HIGH</td> <td class="pkg-version">1.8.0</td> <td>1.10.0</td> <td class="links" data-more-links="off"> <a href="https://github.com/advisories/GHSA-hj5v-574p-mj7c">https://github.com/advisories/GHSA-hj5v-574p-mj7c</a> <a href="https://github.com/pytest-dev/py/issues/256">https://github.com/pytest-dev/py/issues/256</a> <a href="https://github.com/pytest-dev/py/pull/257">https://github.com/pytest-dev/py/pull/257</a> <a href="https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144">https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">https://nvd.nist.gov/vuln/detail/CVE-2020-29651</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">pygments</td> <td>CVE-2021-20270</td> <td class="severity">HIGH</td> <td class="pkg-version">2.3.1</td> <td>2.7.4</td> <td class="links" data-more-links="off"> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1922136">https://bugzilla.redhat.com/show_bug.cgi?id=1922136</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20270">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20270</a> <a href="https://github.com/advisories/GHSA-9w8r-397f-prfh">https://github.com/advisories/GHSA-9w8r-397f-prfh</a> <a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html</a> <a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-20270">https://nvd.nist.gov/vuln/detail/CVE-2021-20270</a> <a href="https://usn.ubuntu.com/usn/usn-4885-1">https://usn.ubuntu.com/usn/usn-4885-1</a> <a href="https://www.debian.org/security/2021/dsa-4889">https://www.debian.org/security/2021/dsa-4889</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">pygments</td> <td>CVE-2021-27291</td> <td class="severity">HIGH</td> <td class="pkg-version">2.3.1</td> <td>2.7.4</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27291">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27291</a> <a href="https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce">https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce</a> <a href="https://github.com/advisories/GHSA-pq64-v7f5-gqh8">https://github.com/advisories/GHSA-pq64-v7f5-gqh8</a> <a href="https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14">https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14</a> <a href="https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html">https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html</a> <a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html</a> <a href="https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html">https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-27291">https://nvd.nist.gov/vuln/detail/CVE-2021-27291</a> <a href="https://usn.ubuntu.com/usn/usn-4897-1">https://usn.ubuntu.com/usn/usn-4897-1</a> <a href="https://www.debian.org/security/2021/dsa-4878">https://www.debian.org/security/2021/dsa-4878</a> <a href="https://www.debian.org/security/2021/dsa-4889">https://www.debian.org/security/2021/dsa-4889</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">pyyaml</td> <td>CVE-2019-20477</td> <td class="severity">CRITICAL</td> <td class="pkg-version">5.1</td> <td>5.2</td> <td class="links" data-more-links="off"> <a href="https://github.com/advisories/GHSA-3pqx-4fqf-j49f">https://github.com/advisories/GHSA-3pqx-4fqf-j49f</a> <a href="https://github.com/yaml/pyyaml/blob/master/CHANGES">https://github.com/yaml/pyyaml/blob/master/CHANGES</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-20477">https://nvd.nist.gov/vuln/detail/CVE-2019-20477</a> <a href="https://www.exploit-db.com/download/47655">https://www.exploit-db.com/download/47655</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">pyyaml</td> <td>CVE-2020-14343</td> <td class="severity">CRITICAL</td> <td class="pkg-version">5.1</td> <td>5.4</td> <td class="links" data-more-links="off"> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1860466">https://bugzilla.redhat.com/show_bug.cgi?id=1860466</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343</a> <a href="https://github.com/advisories/GHSA-8q59-q68h-6hv4">https://github.com/advisories/GHSA-8q59-q68h-6hv4</a> <a href="https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation">https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">https://nvd.nist.gov/vuln/detail/CVE-2020-14343</a> <a href="https://usn.ubuntu.com/usn/usn-4940-1">https://usn.ubuntu.com/usn/usn-4940-1</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">pyyaml</td> <td>CVE-2020-1747</td> <td class="severity">CRITICAL</td> <td class="pkg-version">5.1</td> <td>5.3.1</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html">http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html</a> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747</a> <a href="https://github.com/advisories/GHSA-6757-jp84-gxfx">https://github.com/advisories/GHSA-6757-jp84-gxfx</a> <a href="https://github.com/yaml/pyyaml/pull/386">https://github.com/yaml/pyyaml/pull/386</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">https://nvd.nist.gov/vuln/detail/CVE-2020-1747</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">urllib3</td> <td>CVE-2019-11324</td> <td class="severity">HIGH</td> <td class="pkg-version">1.24.1</td> <td>1.24.2</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html</a> <a href="http://www.openwall.com/lists/oss-security/2019/04/19/1">http://www.openwall.com/lists/oss-security/2019/04/19/1</a> <a href="https://access.redhat.com/errata/RHSA-2019:3335">https://access.redhat.com/errata/RHSA-2019:3335</a> <a href="https://access.redhat.com/errata/RHSA-2019:3590">https://access.redhat.com/errata/RHSA-2019:3590</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324</a> <a href="https://github.com/advisories/GHSA-mh33-7rrq-662w">https://github.com/advisories/GHSA-mh33-7rrq-662w</a> <a href="https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4">https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4</a> <a href="https://linux.oracle.com/cve/CVE-2019-11324.html">https://linux.oracle.com/cve/CVE-2019-11324.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-2068.html">https://linux.oracle.com/errata/ELSA-2020-2068.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">https://nvd.nist.gov/vuln/detail/CVE-2019-11324</a> <a href="https://usn.ubuntu.com/3990-1/">https://usn.ubuntu.com/3990-1/</a> <a href="https://usn.ubuntu.com/usn/usn-3990-1">https://usn.ubuntu.com/usn/usn-3990-1</a> <a href="https://www.openwall.com/lists/oss-security/2019/04/17/3">https://www.openwall.com/lists/oss-security/2019/04/17/3</a> </td> </tr> <tr class="group-header"><th colspan="6">bundler</th></tr> <tr class="sub-header"> <th>Package</th> <th>Vulnerability ID</th> <th>Severity</th> <th>Installed Version</th> <th>Fixed Version</th> <th>Links</th> </tr> <tr class="severity-HIGH"> <td class="pkg-name">actionpack</td> <td>CVE-2020-8164</td> <td class="severity">HIGH</td> <td class="pkg-version">5.2.3</td> <td>6.0.3.1, 5.2.4.3</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8164</a> <a href="https://github.com/advisories/GHSA-8727-m6gj-mc37">https://github.com/advisories/GHSA-8727-m6gj-mc37</a> <a href="https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY">https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY</a> <a href="https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY">https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY</a> <a href="https://hackerone.com/reports/292797">https://hackerone.com/reports/292797</a> <a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html</a> <a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8164">https://nvd.nist.gov/vuln/detail/CVE-2020-8164</a> <a href="https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released">https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released</a> <a href="https://www.debian.org/security/2020/dsa-4766">https://www.debian.org/security/2020/dsa-4766</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">actionpack</td> <td>CVE-2021-22885</td> <td class="severity">HIGH</td> <td class="pkg-version">5.2.3</td> <td>5.2.4.6, 5.2.6, 6.1.3.2, 6.0.3.7</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22885">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22885</a> <a href="https://github.com/advisories/GHSA-hjg4-8q5f-x6fm">https://github.com/advisories/GHSA-hjg4-8q5f-x6fm</a> <a href="https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI">https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI</a> <a href="https://hackerone.com/reports/1106652">https://hackerone.com/reports/1106652</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22885">https://nvd.nist.gov/vuln/detail/CVE-2021-22885</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">activestorage</td> <td>CVE-2020-8162</td> <td class="severity">HIGH</td> <td class="pkg-version">5.2.3</td> <td>6.0.3.1, 5.2.4.3</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8162">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8162</a> <a href="https://github.com/advisories/GHSA-m42x-37p3-fv5w">https://github.com/advisories/GHSA-m42x-37p3-fv5w</a> <a href="https://groups.google.com/forum/#!msg/rubyonrails-security/PjU3946mreQ/Dn-6uLbAAQAJ">https://groups.google.com/forum/#!msg/rubyonrails-security/PjU3946mreQ/Dn-6uLbAAQAJ</a> <a href="https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ">https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ</a> <a href="https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ">https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ</a> <a href="https://hackerone.com/reports/789579">https://hackerone.com/reports/789579</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8162">https://nvd.nist.gov/vuln/detail/CVE-2020-8162</a> <a href="https://www.debian.org/security/2020/dsa-4766">https://www.debian.org/security/2020/dsa-4766</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">activesupport</td> <td>CVE-2020-8165</td> <td class="severity">CRITICAL</td> <td class="pkg-version">5.2.3</td> <td>6.0.3.1, 5.2.4.3</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html</a> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html">http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165</a> <a href="https://github.com/advisories/GHSA-2p68-f74v-9wc6">https://github.com/advisories/GHSA-2p68-f74v-9wc6</a> <a href="https://groups.google.com/forum/#!msg/rubyonrails-security/bv6fW4S0Y1c/KnkEqM7AAQAJ">https://groups.google.com/forum/#!msg/rubyonrails-security/bv6fW4S0Y1c/KnkEqM7AAQAJ</a> <a href="https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c">https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c</a> <a href="https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c">https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c</a> <a href="https://hackerone.com/reports/413388">https://hackerone.com/reports/413388</a> <a href="https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html">https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html</a> <a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8165">https://nvd.nist.gov/vuln/detail/CVE-2020-8165</a> <a href="https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/">https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/</a> <a href="https://www.debian.org/security/2020/dsa-4766">https://www.debian.org/security/2020/dsa-4766</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">json</td> <td>CVE-2020-10663</td> <td class="severity">HIGH</td> <td class="pkg-version">2.2.0</td> <td>2.3.0</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html</a> <a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663</a> <a href="https://github.com/advisories/GHSA-jphg-qwrw-7w9g">https://github.com/advisories/GHSA-jphg-qwrw-7w9g</a> <a href="https://groups.google.com/forum/#!topic/ruby-security-ann/ermX1eQqqKA">https://groups.google.com/forum/#!topic/ruby-security-ann/ermX1eQqqKA</a> <a href="https://hackerone.com/reports/706934">https://hackerone.com/reports/706934</a> <a href="https://linux.oracle.com/cve/CVE-2020-10663.html">https://linux.oracle.com/cve/CVE-2020-10663.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-5724.html">https://linux.oracle.com/errata/ELSA-2020-5724.html</a> <a href="https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E</a> <a href="https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html">https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">https://nvd.nist.gov/vuln/detail/CVE-2020-10663</a> <a href="https://security.netapp.com/advisory/ntap-20210129-0003/">https://security.netapp.com/advisory/ntap-20210129-0003/</a> <a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a> <a href="https://usn.ubuntu.com/usn/usn-4882-1">https://usn.ubuntu.com/usn/usn-4882-1</a> <a href="https://www.debian.org/security/2020/dsa-4721">https://www.debian.org/security/2020/dsa-4721</a> <a href="https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663">https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663</a> <a href="https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/">https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/</a> </td> </tr> <tr class="severity-CRITICAL"> <td class="pkg-name">nokogiri</td> <td>CVE-2019-5477</td> <td class="severity">CRITICAL</td> <td class="pkg-version">1.10.3</td> <td>1.10.4</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5477">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5477</a> <a href="https://github.com/advisories/GHSA-cr5j-953j-xw5p">https://github.com/advisories/GHSA-cr5j-953j-xw5p</a> <a href="https://github.com/sparklemotion/nokogiri/issues/1915">https://github.com/sparklemotion/nokogiri/issues/1915</a> <a href="https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc">https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc</a> <a href="https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc#107--2019-08-06">https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc#107--2019-08-06</a> <a href="https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926">https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926</a> <a href="https://groups.google.com/forum/#!msg/ruby-security-ann/YMnKFsASOAE/Fw3ocLI0BQAJ">https://groups.google.com/forum/#!msg/ruby-security-ann/YMnKFsASOAE/Fw3ocLI0BQAJ</a> <a href="https://hackerone.com/reports/650835">https://hackerone.com/reports/650835</a> <a href="https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html">https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2019-5477">https://nvd.nist.gov/vuln/detail/CVE-2019-5477</a> <a href="https://security.gentoo.org/glsa/202006-05">https://security.gentoo.org/glsa/202006-05</a> <a href="https://usn.ubuntu.com/4175-1/">https://usn.ubuntu.com/4175-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4175-1">https://usn.ubuntu.com/usn/usn-4175-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">nokogiri</td> <td>CVE-2019-13117</td> <td class="severity">HIGH</td> <td class="pkg-version">1.10.3</td> <td>>= 1.10.5</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html</a> <a href="http://www.openwall.com/lists/oss-security/2019/11/17/2">http://www.openwall.com/lists/oss-security/2019/11/17/2</a> <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117</a> <a href="https://github.com/sparklemotion/nokogiri/issues/1943">https://github.com/sparklemotion/nokogiri/issues/1943</a> <a href="https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285">https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285</a> <a href="https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b">https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b</a> <a href="https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1">https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1</a> <a href="https://groups.google.com/d/msg/ruby-security-ann/-Wq4aouIA3Q/yc76ZHemBgAJ">https://groups.google.com/d/msg/ruby-security-ann/-Wq4aouIA3Q/yc76ZHemBgAJ</a> <a href="https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html">https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/</a> <a href="https://oss-fuzz.com/testcase-detail/5631739747106816">https://oss-fuzz.com/testcase-detail/5631739747106816</a> <a href="https://security.netapp.com/advisory/ntap-20190806-0004/">https://security.netapp.com/advisory/ntap-20190806-0004/</a> <a href="https://security.netapp.com/advisory/ntap-20200122-0003/">https://security.netapp.com/advisory/ntap-20200122-0003/</a> <a href="https://usn.ubuntu.com/4164-1/">https://usn.ubuntu.com/4164-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4164-1">https://usn.ubuntu.com/usn/usn-4164-1</a> <a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">nokogiri</td> <td>CVE-2020-7595</td> <td class="severity">HIGH</td> <td class="pkg-version">1.10.3</td> <td>1.10.8</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html</a> <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595</a> <a href="https://github.com/advisories/GHSA-7553-jr98-vx47">https://github.com/advisories/GHSA-7553-jr98-vx47</a> <a href="https://github.com/sparklemotion/nokogiri/issues/1992">https://github.com/sparklemotion/nokogiri/issues/1992</a> <a href="https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076">https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076</a> <a href="https://linux.oracle.com/cve/CVE-2020-7595.html">https://linux.oracle.com/cve/CVE-2020-7595.html</a> <a href="https://linux.oracle.com/errata/ELSA-2020-4479.html">https://linux.oracle.com/errata/ELSA-2020-4479.html</a> <a href="https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html">https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">https://nvd.nist.gov/vuln/detail/CVE-2020-7595</a> <a href="https://security.gentoo.org/glsa/202010-04">https://security.gentoo.org/glsa/202010-04</a> <a href="https://security.netapp.com/advisory/ntap-20200702-0005/">https://security.netapp.com/advisory/ntap-20200702-0005/</a> <a href="https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08">https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08</a> <a href="https://usn.ubuntu.com/4274-1/">https://usn.ubuntu.com/4274-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4274-1">https://usn.ubuntu.com/usn/usn-4274-1</a> <a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">nokogiri</td> <td>GHSA-7rrm-v45f-jp64</td> <td class="severity">HIGH</td> <td class="pkg-version">1.10.3</td> <td>1.11.4</td> <td class="links" data-more-links="off"> <a href="https://github.com/advisories/GHSA-7rrm-v45f-jp64">https://github.com/advisories/GHSA-7rrm-v45f-jp64</a> <a href="https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64">https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">rack</td> <td>CVE-2020-8161</td> <td class="severity">HIGH</td> <td class="pkg-version">2.0.7</td> <td>2.1.3</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8161">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8161</a> <a href="https://github.com/advisories/GHSA-5f9h-9pjv-v6j7">https://github.com/advisories/GHSA-5f9h-9pjv-v6j7</a> <a href="https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e">https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e</a> <a href="https://groups.google.com/forum/#!msg/rubyonrails-security/IOO1vNZTzPA/Ylzi1UYLAAAJ">https://groups.google.com/forum/#!msg/rubyonrails-security/IOO1vNZTzPA/Ylzi1UYLAAAJ</a> <a href="https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA">https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA</a> <a href="https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA">https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA</a> <a href="https://hackerone.com/reports/434404">https://hackerone.com/reports/434404</a> <a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8161">https://nvd.nist.gov/vuln/detail/CVE-2020-8161</a> <a href="https://usn.ubuntu.com/4561-1/">https://usn.ubuntu.com/4561-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4561-1">https://usn.ubuntu.com/usn/usn-4561-1</a> <a href="https://usn.ubuntu.com/usn/usn-4561-2">https://usn.ubuntu.com/usn/usn-4561-2</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">rack</td> <td>CVE-2020-8184</td> <td class="severity">HIGH</td> <td class="pkg-version">2.0.7</td> <td>2.2.3, 2.1.4</td> <td class="links" data-more-links="off"> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8184">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8184</a> <a href="https://github.com/advisories/GHSA-j6w9-fv6q-3q52">https://github.com/advisories/GHSA-j6w9-fv6q-3q52</a> <a href="https://groups.google.com/forum/#!msg/rubyonrails-security/OWtmozPH9Ak/4m00yHPCBAAJ">https://groups.google.com/forum/#!msg/rubyonrails-security/OWtmozPH9Ak/4m00yHPCBAAJ</a> <a href="https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak">https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak</a> <a href="https://hackerone.com/reports/895727">https://hackerone.com/reports/895727</a> <a href="https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html">https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8184">https://nvd.nist.gov/vuln/detail/CVE-2020-8184</a> <a href="https://usn.ubuntu.com/4561-1/">https://usn.ubuntu.com/4561-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4561-1">https://usn.ubuntu.com/usn/usn-4561-1</a> <a href="https://usn.ubuntu.com/usn/usn-4561-2">https://usn.ubuntu.com/usn/usn-4561-2</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">rake</td> <td>CVE-2020-8130</td> <td class="severity">HIGH</td> <td class="pkg-version">12.3.2</td> <td>12.3.3</td> <td class="links" data-more-links="off"> <a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8130">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8130</a> <a href="https://github.com/advisories/GHSA-jppv-gw3r-w3q8">https://github.com/advisories/GHSA-jppv-gw3r-w3q8</a> <a href="https://hackerone.com/reports/651518">https://hackerone.com/reports/651518</a> <a href="https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html">https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/</a> <a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8130">https://nvd.nist.gov/vuln/detail/CVE-2020-8130</a> <a href="https://usn.ubuntu.com/4295-1/">https://usn.ubuntu.com/4295-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4295-1">https://usn.ubuntu.com/usn/usn-4295-1</a> </td> </tr> <tr class="severity-HIGH"> <td class="pkg-name">websocket-extensions</td> <td>CVE-2020-7663</td> <td class="severity">HIGH</td> <td class="pkg-version">0.1.3</td> <td>0.1.5</td> <td class="links" data-more-links="off"> <a href="https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions">https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions</a> <a href="https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions/">https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions/</a> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7663</a> <a href="https://github.com/advisories/GHSA-g6wq-qcwm-j5g2">https://github.com/advisories/GHSA-g6wq-qcwm-j5g2</a> <a href="https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b">https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b</a> <a href="https://github.com/faye/websocket-extensions-ruby/security/advisories/GHSA-g6wq-qcwm-j5g2">https://github.com/faye/websocket-extensions-ruby/security/advisories/GHSA-g6wq-qcwm-j5g2</a> <a href="https://lists.debian.org/debian-lts-announce/2020/08/msg00031.html">https://lists.debian.org/debian-lts-announce/2020/08/msg00031.html</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-7663">https://nvd.nist.gov/vuln/detail/CVE-2020-7663</a> <a href="https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830">https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830</a> <a href="https://usn.ubuntu.com/4502-1/">https://usn.ubuntu.com/4502-1/</a> <a href="https://usn.ubuntu.com/usn/usn-4502-1">https://usn.ubuntu.com/usn/usn-4502-1</a> </td> </tr> <tr class="group-header"><th colspan="6">cargo</th></tr> <tr><th colspan="6">No Vulnerabilities found</th></tr> </table>